2 This file is part of GNUnet.
3 Copyright (C) 2012 GNUnet e.V.
5 GNUnet is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published
7 by the Free Software Foundation; either version 3, or (at your
8 option) any later version.
10 GNUnet is distributed in the hope that it will be useful, but
11 WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with GNUnet; see the file COPYING. If not, write to the
17 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
18 Boston, MA 02110-1301, USA.
22 * @file dns/gnunet-service-dns.c
23 * @brief service to intercept and modify DNS queries (and replies) of this system
24 * @author Christian Grothoff
26 * For "secure" interaction with the legacy DNS system, we permit
27 * replies only to arrive within a 5s window (and they must match
28 * ports, IPs and request IDs). Furthermore, we let the OS pick a
29 * source port, opening up to 128 sockets per address family (IPv4 or
30 * IPv6). Those sockets are closed if they are not in use for 5s
31 * (which means they will be freshly randomized afterwards). For new
32 * requests, we pick a random slot in the array with 128 socket slots
33 * (and re-use an existing socket if the slot is still in use). Thus
34 * each request will be given one of 128 random source ports, and the
35 * 128 random source ports will also change "often" (less often if the
36 * system is very busy, each time if we are mostly idle). At the same
37 * time, the system will never use more than 256 UDP sockets.
40 #include "gnunet_util_lib.h"
41 #include "gnunet_applications.h"
42 #include "gnunet_constants.h"
43 #include "gnunet_protocols.h"
44 #include "gnunet_signatures.h"
46 #include "gnunet_dns_service.h"
47 #include "gnunet_dnsparser_lib.h"
48 #include "gnunet_dnsstub_lib.h"
49 #include "gnunet_statistics_service.h"
50 #include "gnunet_tun_lib.h"
59 * Generic logging shorthand
61 #define LOG(kind, ...) \
62 GNUNET_log_from (kind, "dns", __VA_ARGS__);
66 * Phases each request goes through.
71 * Request has just been received.
76 * Showing the request to all monitor clients. If
77 * client list is empty, will enter QUERY phase.
82 * Showing the request to PRE-RESOLUTION clients to find an answer.
83 * If client list is empty, will trigger global DNS request.
88 * Global Internet query is now pending.
93 * Client (or global DNS request) has resulted in a response.
94 * Forward to all POST-RESOLUTION clients. If client list is empty,
95 * will enter RESPONSE_MONITOR phase.
100 * Showing the request to all monitor clients. If
101 * client list is empty, give the result to the hijacker (and be done).
106 * Some client has told us to drop the request.
113 * Entry we keep for each client.
118 * Kept in doubly-linked list.
120 struct ClientRecord *next;
123 * Kept in doubly-linked list.
125 struct ClientRecord *prev;
128 * Handle to the client.
130 struct GNUNET_SERVER_Client *client;
133 * Flags for the client.
135 enum GNUNET_DNS_Flags flags;
141 * Entry we keep for each active request.
147 * List of clients that still need to see this request (each entry
148 * is set to NULL when the client is done).
150 struct ClientRecord **client_wait_list;
153 * Payload of the UDP packet (the UDP payload), can be either query
154 * or already the response.
159 * Socket we are using to transmit this request (must match if we receive
162 struct GNUNET_DNSSTUB_RequestSocket *rs;
165 * Source address of the original request (for sending response).
167 struct sockaddr_storage src_addr;
170 * Destination address of the original request (for potential use as exit).
172 struct sockaddr_storage dst_addr;
175 * ID of this request, also basis for hashing. Lowest 16 bit will
176 * be our message ID when doing a global DNS request and our index
177 * into the 'requests' array.
182 * Number of bytes in payload.
184 size_t payload_length;
187 * Length of the client wait list.
189 unsigned int client_wait_list_length;
192 * In which phase this this request?
194 enum RequestPhase phase;
200 * Global return value from 'main'.
202 static int global_ret;
205 * The configuration to use
207 static const struct GNUNET_CONFIGURATION_Handle *cfg;
212 static struct GNUNET_STATISTICS_Handle *stats;
215 * Handle to DNS hijacker helper process ("gnunet-helper-dns").
217 static struct GNUNET_HELPER_Handle *hijacker;
220 * Command-line arguments we are giving to the hijacker process.
222 static char *helper_argv[8];
225 * Head of DLL of clients we consult.
227 static struct ClientRecord *clients_head;
230 * Tail of DLL of clients we consult.
232 static struct ClientRecord *clients_tail;
235 * Our notification context.
237 static struct GNUNET_SERVER_NotificationContext *nc;
240 * Array of all open requests.
242 static struct RequestRecord requests[UINT16_MAX + 1];
245 * Generator for unique request IDs.
247 static uint64_t request_id_gen;
250 * Handle to the DNS Stub resolver.
252 static struct GNUNET_DNSSTUB_Context *dnsstub;
256 * We're done processing a DNS request, free associated memory.
258 * @param rr request to clean up
261 cleanup_rr (struct RequestRecord *rr)
263 GNUNET_free_non_null (rr->payload);
265 rr->payload_length = 0;
266 GNUNET_array_grow (rr->client_wait_list,
267 rr->client_wait_list_length,
273 * Task run during shutdown.
278 cleanup_task (void *cls GNUNET_UNUSED)
282 if (NULL != hijacker)
284 GNUNET_HELPER_stop (hijacker, GNUNET_NO);
288 GNUNET_free_non_null (helper_argv[i]);
289 for (i=0;i<=UINT16_MAX;i++)
290 cleanup_rr (&requests[i]);
291 GNUNET_SERVER_notification_context_destroy (nc);
295 GNUNET_STATISTICS_destroy (stats, GNUNET_NO);
300 GNUNET_DNSSTUB_stop (dnsstub);
307 * We're done with some request, finish processing.
309 * @param rr request send to the network or just clean up.
312 request_done (struct RequestRecord *rr)
314 struct GNUNET_MessageHeader *hdr;
316 uint16_t source_port;
317 uint16_t destination_port;
319 GNUNET_array_grow (rr->client_wait_list,
320 rr->client_wait_list_length,
322 if (RP_RESPONSE_MONITOR != rr->phase)
324 /* no response, drop */
325 LOG (GNUNET_ERROR_TYPE_DEBUG,
326 "Got no response for request %llu, dropping\n",
327 (unsigned long long) rr->request_id);
332 LOG (GNUNET_ERROR_TYPE_DEBUG,
333 "Transmitting response for request %llu\n",
334 (unsigned long long) rr->request_id);
335 /* send response via hijacker */
336 reply_len = sizeof (struct GNUNET_MessageHeader);
337 reply_len += sizeof (struct GNUNET_TUN_Layer2PacketHeader);
338 switch (rr->src_addr.ss_family)
341 reply_len += sizeof (struct GNUNET_TUN_IPv4Header);
344 reply_len += sizeof (struct GNUNET_TUN_IPv6Header);
351 reply_len += sizeof (struct GNUNET_TUN_UdpHeader);
352 reply_len += rr->payload_length;
353 if (reply_len >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
355 /* response too big, drop */
356 GNUNET_break (0); /* how can this be? */
361 char buf[reply_len] GNUNET_ALIGN;
363 struct GNUNET_TUN_IPv4Header ip4;
364 struct GNUNET_TUN_IPv6Header ip6;
366 /* first, GNUnet message header */
367 hdr = (struct GNUNET_MessageHeader*) buf;
368 hdr->type = htons (GNUNET_MESSAGE_TYPE_DNS_HELPER);
369 hdr->size = htons ((uint16_t) reply_len);
370 off = sizeof (struct GNUNET_MessageHeader);
372 /* first, TUN header */
374 struct GNUNET_TUN_Layer2PacketHeader tun;
376 tun.flags = htons (0);
377 if (rr->src_addr.ss_family == AF_INET)
378 tun.proto = htons (ETH_P_IPV4);
380 tun.proto = htons (ETH_P_IPV6);
381 memcpy (&buf[off], &tun, sizeof (struct GNUNET_TUN_Layer2PacketHeader));
382 off += sizeof (struct GNUNET_TUN_Layer2PacketHeader);
386 switch (rr->src_addr.ss_family)
390 struct sockaddr_in *src = (struct sockaddr_in *) &rr->src_addr;
391 struct sockaddr_in *dst = (struct sockaddr_in *) &rr->dst_addr;
393 source_port = dst->sin_port;
394 destination_port = src->sin_port;
395 GNUNET_TUN_initialize_ipv4_header (&ip4,
397 reply_len - off - sizeof (struct GNUNET_TUN_IPv4Header),
400 memcpy (&buf[off], &ip4, sizeof (ip4));
406 struct sockaddr_in6 *src = (struct sockaddr_in6 *) &rr->src_addr;
407 struct sockaddr_in6 *dst = (struct sockaddr_in6 *) &rr->dst_addr;
409 source_port = dst->sin6_port;
410 destination_port = src->sin6_port;
411 GNUNET_TUN_initialize_ipv6_header (&ip6,
413 reply_len - sizeof (struct GNUNET_TUN_IPv6Header),
416 memcpy (&buf[off], &ip6, sizeof (ip6));
426 struct GNUNET_TUN_UdpHeader udp;
428 udp.source_port = source_port;
429 udp.destination_port = destination_port;
430 udp.len = htons (reply_len - off);
431 if (AF_INET == rr->src_addr.ss_family)
432 GNUNET_TUN_calculate_udp4_checksum (&ip4,
437 GNUNET_TUN_calculate_udp6_checksum (&ip6,
441 memcpy (&buf[off], &udp, sizeof (udp));
445 /* now DNS payload */
447 memcpy (&buf[off], rr->payload, rr->payload_length);
448 off += rr->payload_length;
450 /* final checks & sending */
451 GNUNET_assert (off == reply_len);
452 (void) GNUNET_HELPER_send (hijacker,
456 GNUNET_STATISTICS_update (stats,
457 gettext_noop ("# DNS requests answered via TUN interface"),
460 /* clean up, we're done */
466 * Show the payload of the given request record to the client
467 * (and wait for a response).
469 * @param rr request to send to client
470 * @param client client to send the response to
473 send_request_to_client (struct RequestRecord *rr,
474 struct GNUNET_SERVER_Client *client)
476 char buf[sizeof (struct GNUNET_DNS_Request) + rr->payload_length] GNUNET_ALIGN;
477 struct GNUNET_DNS_Request *req;
479 if (sizeof (buf) >= GNUNET_SERVER_MAX_MESSAGE_SIZE)
485 LOG (GNUNET_ERROR_TYPE_DEBUG,
486 "Sending information about request %llu to local client\n",
487 (unsigned long long) rr->request_id);
488 req = (struct GNUNET_DNS_Request*) buf;
489 req->header.type = htons (GNUNET_MESSAGE_TYPE_DNS_CLIENT_REQUEST);
490 req->header.size = htons (sizeof (buf));
491 req->reserved = htonl (0);
492 req->request_id = rr->request_id;
493 memcpy (&req[1], rr->payload, rr->payload_length);
494 GNUNET_SERVER_notification_context_unicast (nc,
503 * Callback called from DNSSTUB resolver when a resolution
507 * @param rs the socket that received the response
508 * @param dns the response itself
509 * @param r number of bytes in dns
512 process_dns_result (void *cls,
513 struct GNUNET_DNSSTUB_RequestSocket *rs,
514 const struct GNUNET_TUN_DnsHeader *dns,
519 * A client has completed its processing for this
522 * @param rr request to process further
525 next_phase (struct RequestRecord *rr)
527 struct ClientRecord *cr;
532 if (rr->phase == RP_DROP)
538 for (j=0;j<rr->client_wait_list_length;j++)
540 if (NULL != rr->client_wait_list[j])
548 send_request_to_client (rr, rr->client_wait_list[nz]->client);
551 /* done with current phase, advance! */
552 LOG (GNUNET_ERROR_TYPE_DEBUG,
553 "Request %llu now in phase %d\n",
559 rr->phase = RP_REQUEST_MONITOR;
560 for (cr = clients_head; NULL != cr; cr = cr->next)
562 if (0 != (cr->flags & GNUNET_DNS_FLAG_REQUEST_MONITOR))
563 GNUNET_array_append (rr->client_wait_list,
564 rr->client_wait_list_length,
569 case RP_REQUEST_MONITOR:
570 rr->phase = RP_QUERY;
571 for (cr = clients_head; NULL != cr; cr = cr->next)
573 if (0 != (cr->flags & GNUNET_DNS_FLAG_PRE_RESOLUTION))
574 GNUNET_array_append (rr->client_wait_list,
575 rr->client_wait_list_length,
581 switch (rr->dst_addr.ss_family)
584 salen = sizeof (struct sockaddr_in);
587 salen = sizeof (struct sockaddr_in6);
593 rr->phase = RP_INTERNET_DNS;
594 rr->rs = GNUNET_DNSSTUB_resolve (dnsstub,
595 (struct sockaddr*) &rr->dst_addr,
603 GNUNET_STATISTICS_update (stats,
604 gettext_noop ("# DNS exit failed (failed to open socket)"),
610 case RP_INTERNET_DNS:
611 rr->phase = RP_MODIFY;
612 for (cr = clients_head; NULL != cr; cr = cr->next)
614 if (0 != (cr->flags & GNUNET_DNS_FLAG_POST_RESOLUTION))
615 GNUNET_array_append (rr->client_wait_list,
616 rr->client_wait_list_length,
622 rr->phase = RP_RESPONSE_MONITOR;
623 for (cr = clients_head; NULL != cr; cr = cr->next)
625 if (0 != (cr->flags & GNUNET_DNS_FLAG_RESPONSE_MONITOR))
626 GNUNET_array_append (rr->client_wait_list,
627 rr->client_wait_list_length,
632 case RP_RESPONSE_MONITOR:
647 * A client disconnected, clean up after it.
650 * @param client handle of client that disconnected
653 client_disconnect (void *cls, struct GNUNET_SERVER_Client *client)
655 struct ClientRecord *cr;
656 struct RequestRecord *rr;
660 for (cr = clients_head; NULL != cr; cr = cr->next)
662 if (cr->client == client)
664 GNUNET_SERVER_client_drop (client);
665 GNUNET_CONTAINER_DLL_remove (clients_head,
668 for (i=0;i<UINT16_MAX;i++)
671 if (0 == rr->client_wait_list_length)
672 continue; /* not in use */
673 for (j=0;j<rr->client_wait_list_length;j++)
675 if (rr->client_wait_list[j] == cr)
677 rr->client_wait_list[j] = NULL;
690 * Callback called from DNSSTUB resolver when a resolution
694 * @param rs the socket that received the response
695 * @param dns the response itself
696 * @param r number of bytes in dns
699 process_dns_result (void *cls,
700 struct GNUNET_DNSSTUB_RequestSocket *rs,
701 const struct GNUNET_TUN_DnsHeader *dns,
704 struct RequestRecord *rr;
706 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
707 "Processing DNS result from stub resolver\n");
708 GNUNET_assert (NULL == cls);
709 rr = &requests[dns->id];
710 if ( (rr->phase != RP_INTERNET_DNS) ||
713 /* unexpected / bogus reply */
714 GNUNET_STATISTICS_update (stats,
715 gettext_noop ("# External DNS response discarded (no matching request)"),
717 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
718 "Received DNS reply that does not match any pending request. Dropping.\n");
721 LOG (GNUNET_ERROR_TYPE_DEBUG,
722 "Got a response from the stub resolver for DNS request %llu intercepted locally!\n",
723 (unsigned long long) rr->request_id);
724 GNUNET_free_non_null (rr->payload);
725 rr->payload = GNUNET_malloc (r);
726 memcpy (rr->payload, dns, r);
727 rr->payload_length = r;
733 * We got a new client. Make sure all new DNS requests pass by its desk.
736 * @param client the new client
737 * @param message the init message (unused)
740 handle_client_init (void *cls GNUNET_UNUSED,
741 struct GNUNET_SERVER_Client *client,
742 const struct GNUNET_MessageHeader *message)
744 struct ClientRecord *cr;
745 const struct GNUNET_DNS_Register *reg = (const struct GNUNET_DNS_Register*) message;
747 cr = GNUNET_new (struct ClientRecord);
749 cr->flags = (enum GNUNET_DNS_Flags) ntohl (reg->flags);
750 GNUNET_SERVER_client_keep (client);
751 GNUNET_CONTAINER_DLL_insert (clients_head,
754 GNUNET_SERVER_notification_context_add (nc, client);
755 GNUNET_SERVER_receive_done (client, GNUNET_OK);
760 * We got a response from a client.
763 * @param client the client
764 * @param message the response
767 handle_client_response (void *cls GNUNET_UNUSED,
768 struct GNUNET_SERVER_Client *client,
769 const struct GNUNET_MessageHeader *message)
771 const struct GNUNET_DNS_Response *resp;
772 struct RequestRecord *rr;
777 msize = ntohs (message->size);
778 if (msize < sizeof (struct GNUNET_DNS_Response))
781 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
784 resp = (const struct GNUNET_DNS_Response*) message;
785 off = (uint16_t) resp->request_id;
787 LOG (GNUNET_ERROR_TYPE_DEBUG,
788 "Received DNS response with ID %llu from local client!\n",
789 (unsigned long long) resp->request_id);
790 if (rr->request_id != resp->request_id)
792 GNUNET_STATISTICS_update (stats,
793 gettext_noop ("# Client response discarded (no matching request)"),
795 GNUNET_SERVER_receive_done (client, GNUNET_OK);
798 for (i=0;i<rr->client_wait_list_length;i++)
800 if (NULL == rr->client_wait_list[i])
802 if (rr->client_wait_list[i]->client != client)
804 rr->client_wait_list[i] = NULL;
805 switch (ntohl (resp->drop_flag))
810 case 1: /* no change */
813 msize -= sizeof (struct GNUNET_DNS_Response);
814 if ( (sizeof (struct GNUNET_TUN_DnsHeader) > msize) ||
815 (RP_REQUEST_MONITOR == rr->phase) ||
816 (RP_RESPONSE_MONITOR == rr->phase) )
819 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
823 GNUNET_free_non_null (rr->payload);
824 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
825 "Changing DNS reply according to client specifications\n");
826 rr->payload = GNUNET_malloc (msize);
827 rr->payload_length = msize;
828 memcpy (rr->payload, &resp[1], msize);
829 if (rr->phase == RP_QUERY)
831 /* clear wait list, we're moving to MODIFY phase next */
832 GNUNET_array_grow (rr->client_wait_list,
833 rr->client_wait_list_length,
836 /* if query changed to answer, move past DNS resolution phase... */
837 if ( (RP_QUERY == rr->phase) &&
838 (rr->payload_length > sizeof (struct GNUNET_TUN_DnsHeader)) &&
839 ((struct GNUNET_TUN_DnsFlags*)&(((struct GNUNET_TUN_DnsHeader*) rr->payload)->flags))->query_or_response == 1)
841 rr->phase = RP_INTERNET_DNS;
842 GNUNET_array_grow (rr->client_wait_list,
843 rr->client_wait_list_length,
849 GNUNET_SERVER_receive_done (client, GNUNET_OK);
852 /* odd, client was not on our list for the request, that ought
855 GNUNET_SERVER_receive_done (client, GNUNET_SYSERR);
860 * Functions with this signature are called whenever a complete
861 * message is received by the tokenizer from the DNS hijack process.
864 * @param client identification of the client
865 * @param message the actual message, a DNS request we should handle
868 process_helper_messages (void *cls GNUNET_UNUSED, void *client,
869 const struct GNUNET_MessageHeader *message)
872 const struct GNUNET_TUN_Layer2PacketHeader *tun;
873 const struct GNUNET_TUN_IPv4Header *ip4;
874 const struct GNUNET_TUN_IPv6Header *ip6;
875 const struct GNUNET_TUN_UdpHeader *udp;
876 const struct GNUNET_TUN_DnsHeader *dns;
877 struct RequestRecord *rr;
878 struct sockaddr_in *srca4;
879 struct sockaddr_in6 *srca6;
880 struct sockaddr_in *dsta4;
881 struct sockaddr_in6 *dsta6;
883 LOG (GNUNET_ERROR_TYPE_DEBUG,
884 "Intercepted message via DNS hijacker\n");
885 msize = ntohs (message->size);
886 if (msize < sizeof (struct GNUNET_MessageHeader) + sizeof (struct GNUNET_TUN_Layer2PacketHeader) + sizeof (struct GNUNET_TUN_IPv4Header))
888 /* non-IP packet received on TUN!? */
892 msize -= sizeof (struct GNUNET_MessageHeader);
893 tun = (const struct GNUNET_TUN_Layer2PacketHeader *) &message[1];
894 msize -= sizeof (struct GNUNET_TUN_Layer2PacketHeader);
895 switch (ntohs (tun->proto))
898 ip4 = (const struct GNUNET_TUN_IPv4Header *) &tun[1];
899 ip6 = NULL; /* make compiler happy */
900 if ( (msize < sizeof (struct GNUNET_TUN_IPv4Header)) ||
901 (ip4->version != 4) ||
902 (ip4->header_length != sizeof (struct GNUNET_TUN_IPv4Header) / 4) ||
903 (ntohs(ip4->total_length) != msize) ||
904 (ip4->protocol != IPPROTO_UDP) )
906 /* non-IP/UDP packet received on TUN (or with options) */
907 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
908 _("Received malformed IPv4-UDP packet on TUN interface.\n"));
911 udp = (const struct GNUNET_TUN_UdpHeader*) &ip4[1];
912 msize -= sizeof (struct GNUNET_TUN_IPv4Header);
915 ip4 = NULL; /* make compiler happy */
916 ip6 = (const struct GNUNET_TUN_IPv6Header *) &tun[1];
917 if ( (msize < sizeof (struct GNUNET_TUN_IPv6Header)) ||
918 (ip6->version != 6) ||
919 (ntohs (ip6->payload_length) != msize) ||
920 (ip6->next_header != IPPROTO_UDP) )
922 /* non-IP/UDP packet received on TUN (or with extensions) */
923 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
924 _("Received malformed IPv6-UDP packet on TUN interface.\n"));
927 udp = (const struct GNUNET_TUN_UdpHeader*) &ip6[1];
928 msize -= sizeof (struct GNUNET_TUN_IPv6Header);
931 /* non-IP packet received on TUN!? */
932 GNUNET_log (GNUNET_ERROR_TYPE_INFO,
933 _("Got non-IP packet with %u bytes and protocol %u from TUN\n"),
934 (unsigned int) msize,
938 if ( (msize <= sizeof (struct GNUNET_TUN_UdpHeader) + sizeof (struct GNUNET_TUN_DnsHeader)) ||
939 (DNS_PORT != ntohs (udp->destination_port)) )
941 /* non-DNS packet received on TUN, ignore */
942 GNUNET_STATISTICS_update (stats,
943 gettext_noop ("# Non-DNS UDP packet received via TUN interface"),
947 msize -= sizeof (struct GNUNET_TUN_UdpHeader);
948 dns = (const struct GNUNET_TUN_DnsHeader*) &udp[1];
949 rr = &requests[dns->id];
951 /* clean up from previous request */
952 GNUNET_free_non_null (rr->payload);
954 GNUNET_array_grow (rr->client_wait_list,
955 rr->client_wait_list_length,
958 /* setup new request */
960 switch (ntohs (tun->proto))
964 srca4 = (struct sockaddr_in*) &rr->src_addr;
965 dsta4 = (struct sockaddr_in*) &rr->dst_addr;
966 memset (srca4, 0, sizeof (struct sockaddr_in));
967 memset (dsta4, 0, sizeof (struct sockaddr_in));
968 srca4->sin_family = AF_INET;
969 dsta4->sin_family = AF_INET;
970 srca4->sin_addr = ip4->source_address;
971 dsta4->sin_addr = ip4->destination_address;
972 srca4->sin_port = udp->source_port;
973 dsta4->sin_port = udp->destination_port;
974 #if HAVE_SOCKADDR_IN_SIN_LEN
975 srca4->sin_len = sizeof (struct sockaddr_in);
976 dsta4->sin_len = sizeof (struct sockaddr_in);
982 srca6 = (struct sockaddr_in6*) &rr->src_addr;
983 dsta6 = (struct sockaddr_in6*) &rr->dst_addr;
984 memset (srca6, 0, sizeof (struct sockaddr_in6));
985 memset (dsta6, 0, sizeof (struct sockaddr_in6));
986 srca6->sin6_family = AF_INET6;
987 dsta6->sin6_family = AF_INET6;
988 srca6->sin6_addr = ip6->source_address;
989 dsta6->sin6_addr = ip6->destination_address;
990 srca6->sin6_port = udp->source_port;
991 dsta6->sin6_port = udp->destination_port;
992 #if HAVE_SOCKADDR_IN_SIN_LEN
993 srca6->sin6_len = sizeof (struct sockaddr_in6);
994 dsta6->sin6_len = sizeof (struct sockaddr_in6);
1001 rr->payload = GNUNET_malloc (msize);
1002 rr->payload_length = msize;
1003 memcpy (rr->payload, dns, msize);
1004 rr->request_id = dns->id | (request_id_gen << 16);
1006 LOG (GNUNET_ERROR_TYPE_DEBUG,
1007 "Creating new DNS request %llu\n",
1008 (unsigned long long) rr->request_id);
1009 GNUNET_STATISTICS_update (stats,
1010 gettext_noop ("# DNS requests received via TUN interface"),
1012 /* start request processing state machine */
1019 * @param cls closure
1020 * @param server the initialized server
1021 * @param cfg_ configuration to use
1024 run (void *cls, struct GNUNET_SERVER_Handle *server,
1025 const struct GNUNET_CONFIGURATION_Handle *cfg_)
1027 static const struct GNUNET_SERVER_MessageHandler handlers[] = {
1028 /* callback, cls, type, size */
1029 {&handle_client_init, NULL, GNUNET_MESSAGE_TYPE_DNS_CLIENT_INIT,
1030 sizeof (struct GNUNET_DNS_Register)},
1031 {&handle_client_response, NULL, GNUNET_MESSAGE_TYPE_DNS_CLIENT_RESPONSE, 0},
1039 struct in_addr dns_exit4;
1040 struct in6_addr dns_exit6;
1046 stats = GNUNET_STATISTICS_create ("dns", cfg);
1047 nc = GNUNET_SERVER_notification_context_create (server, 1);
1048 GNUNET_SCHEDULER_add_shutdown (&cleanup_task,
1051 if ( ( (GNUNET_OK !=
1052 GNUNET_CONFIGURATION_get_value_string (cfg,
1056 ( (1 != inet_pton (AF_INET, dns_exit, &dns_exit4)) &&
1057 (1 != inet_pton (AF_INET6, dns_exit, &dns_exit6)) ) ) )
1059 GNUNET_log_config_invalid (GNUNET_ERROR_TYPE_ERROR,
1062 _("need a valid IPv4 or IPv6 address\n"));
1063 GNUNET_free_non_null (dns_exit);
1066 dnsstub = GNUNET_DNSSTUB_start (dns_exit);
1067 GNUNET_free_non_null (dns_exit);
1068 GNUNET_SERVER_add_handlers (server,
1070 GNUNET_SERVER_disconnect_notify (server,
1073 binary = GNUNET_OS_get_libexec_binary_path ("gnunet-helper-dns");
1075 GNUNET_OS_check_helper_binary (binary,
1077 NULL)) // TODO: once we have a windows-testcase, add test parameters here
1079 GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
1080 _("`%s' must be installed SUID, will not run DNS interceptor\n"),
1083 GNUNET_free (binary);
1086 GNUNET_free (binary);
1088 helper_argv[0] = GNUNET_strdup ("gnunet-dns");
1089 if (GNUNET_SYSERR ==
1090 GNUNET_CONFIGURATION_get_value_string (cfg, "dns", "IFNAME", &ifc_name))
1092 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
1093 "No entry 'IFNAME' in configuration!\n");
1094 GNUNET_SCHEDULER_shutdown ();
1097 helper_argv[1] = ifc_name;
1098 if ( (GNUNET_SYSERR ==
1099 GNUNET_CONFIGURATION_get_value_string (cfg, "dns", "IPV6ADDR",
1102 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
1103 "No entry 'IPV6ADDR' in configuration!\n");
1104 GNUNET_SCHEDULER_shutdown ();
1107 helper_argv[2] = ipv6addr;
1108 if (GNUNET_SYSERR ==
1109 GNUNET_CONFIGURATION_get_value_string (cfg, "dns", "IPV6PREFIX",
1112 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
1113 "No entry 'IPV6PREFIX' in configuration!\n");
1114 GNUNET_SCHEDULER_shutdown ();
1117 helper_argv[3] = ipv6prefix;
1119 if (GNUNET_SYSERR ==
1120 GNUNET_CONFIGURATION_get_value_string (cfg, "dns", "IPV4ADDR",
1123 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
1124 "No entry 'IPV4ADDR' in configuration!\n");
1125 GNUNET_SCHEDULER_shutdown ();
1128 helper_argv[4] = ipv4addr;
1129 if (GNUNET_SYSERR ==
1130 GNUNET_CONFIGURATION_get_value_string (cfg, "dns", "IPV4MASK",
1133 GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
1134 "No entry 'IPV4MASK' in configuration!\n");
1135 GNUNET_SCHEDULER_shutdown ();
1138 helper_argv[5] = ipv4mask;
1140 nortsetup = GNUNET_CONFIGURATION_get_value_yesno (cfg, "dns",
1141 "SKIP_ROUTING_SETUP");
1142 if (GNUNET_YES == nortsetup)
1143 helper_argv[6] = GNUNET_strdup("1");
1145 helper_argv[6] = GNUNET_strdup("0");
1147 helper_argv[7] = NULL;
1148 hijacker = GNUNET_HELPER_start (GNUNET_NO,
1149 "gnunet-helper-dns",
1151 &process_helper_messages,
1157 * The main function for the dns service.
1159 * @param argc number of arguments from the command line
1160 * @param argv command line arguments
1161 * @return 0 ok, 1 on error
1164 main (int argc, char *const *argv)
1166 /* make use of SGID capabilities on POSIX */
1167 /* FIXME: this might need a port on systems without 'getresgid' */
1173 if (-1 == getresgid (&rgid, &egid, &sgid))
1176 "getresgid failed: %s\n",
1179 else if (sgid != rgid)
1181 if (-1 == setregid (sgid, sgid))
1182 fprintf (stderr, "setregid failed: %s\n", strerror (errno));
1185 return (GNUNET_OK ==
1186 GNUNET_SERVICE_run (argc, argv, "dns", GNUNET_SERVICE_OPTION_NONE,
1187 &run, NULL)) ? global_ret : 1;
1191 /* end of gnunet-service-dns.c */